search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Linux kernel USB drivers do not initialize kernel memory properly

Vulnerability Note VU#981134

Original Release Date: 2004-10-22 | Last Revised: 2004-10-25

Overview

Various Linux USB drivers contain an information disclosure vulnerability that may expose sensitive segments of kernel memory to users.

Description

USB drivers for several versions the Linux kernel do not properly initialize kernel memory before using it. When an affected USB driver copies uninitialized memory from kernel space to user space (with the copy_to_user function), the previous kernel memory contents will be copied as well. In some cases, this will grant a user inappropriate access to sensitive segments of kernel memory.

Impact

Users may be able to view sensitive segments of kernel memory.

Solution

Check with Vendor

Users who suspect they are vulnerable are encouraged to check with their vendor to determine the appropriate action to take.

Upgrade to Unaffected Build of the Linux Kernel

Users are encouraged to upgrade to an unaffected build of the Linux kernel.

Vendor Information

981134
 

View all 19 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Tim Yamin.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2004-0685
Severity Metric: 0.48
Date Public: 2004-08-25
Date First Published: 2004-10-22
Date Last Updated: 2004-10-25 15:05 UTC
Document Revision: 153

Sponsored by CISA.